<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2020-5-2-0-4</article-id><article-id pub-id-type="publisher-id">2073</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>IMPROVED GRAPHICAL AUTHENTICATION &amp;nbsp;ALGORITHM WITH ANTI-SPYING PROTECTION&amp;nbsp;</article-title><trans-title-group xml:lang="en"><trans-title>IMPROVED GRAPHICAL AUTHENTICATION &amp;nbsp;ALGORITHM WITH ANTI-SPYING PROTECTION&amp;nbsp;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kakaev</surname><given-names>Denis Valerievich</given-names></name><name xml:lang="en"><surname>Kakaev</surname><given-names>Denis Valerievich</given-names></name></name-alternatives><email>619deniss61999@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Devitsyna</surname><given-names>Svetlana Nikolaevna</given-names></name><name xml:lang="en"><surname>Devitsyna</surname><given-names>Svetlana Nikolaevna</given-names></name></name-alternatives><email>sndevitsyna@sevsu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2020</year></pub-date><volume>5</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2020/2/ИТ_4.pdf" /><abstract xml:lang="ru"><p>This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the research is due to the need to protect user-entered identifiers from shoulder surfing. The problem of protection against spying when entering identifiers, such as passwords, pin codes, CAPTCHA characters, occurs because some information systems are located in rooms with a large number of people. The most common such systems are terminals and ATMs. In this case, peeping becomes a method of stealing password information, and is widely used by an attacker. One solution to this problem is to use graphical authentication with anti-peeping protection. At the moment, there are no reliable graphical authentication modules that exclude the possibility of spying on password information. Standard algorithms for implementing graphical authentication schemes with protection from shoulder surfing have a number of problems with security and usability. The proposed method provides sufficient security and eliminates hacking attempts, even if the attacker observes the passage of&amp;nbsp;graphical authentication. The article presents the description of a new approach to graphical authentication based on the schema of the triangle. The results of testing the app on real users are described. Based on login statistics and a survey of participants, conclusions are made about the results of the application.&amp;nbsp;</p></abstract><trans-abstract xml:lang="en"><p>This article provides an example of implementing graphical user authentication based on a triangle scheme. The relevance of the research is due to the need to protect user-entered identifiers from shoulder surfing. The problem of protection against spying when entering identifiers, such as passwords, pin codes, CAPTCHA characters, occurs because some information systems are located in rooms with a large number of people. The most common such systems are terminals and ATMs. In this case, peeping becomes a method of stealing password information, and is widely used by an attacker. One solution to this problem is to use graphical authentication with anti-peeping protection. At the moment, there are no reliable graphical authentication modules that exclude the possibility of spying on password information. Standard algorithms for implementing graphical authentication schemes with protection from shoulder surfing have a number of problems with security and usability. The proposed method provides sufficient security and eliminates hacking attempts, even if the attacker observes the passage of&amp;nbsp;graphical authentication. The article presents the description of a new approach to graphical authentication based on the schema of the triangle. The results of testing the app on real users are described. Based on login statistics and a survey of participants, conclusions are made about the results of the application.&amp;nbsp;</p></trans-abstract><kwd-group xml:lang="ru"><kwd>authentication</kwd><kwd>information system</kwd><kwd>Linux-PAM</kwd><kwd>graphical authentication</kwd><kwd>brutforce</kwd></kwd-group><kwd-group xml:lang="en"><kwd>authentication</kwd><kwd>information system</kwd><kwd>Linux-PAM</kwd><kwd>graphical authentication</kwd><kwd>brutforce</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Habr, 2011. Practical recommendations for choosing passwords based on the results of hacking antichat.ru. URL: https://habr.com/ru/post/122633 (date of circulation: 08.05.2020).</mixed-citation></ref><ref id="B2"><mixed-citation>Hackware, 2017. Brut-force websites: instructions for using patator, Hydra, Medusa. URL: https://hackware.ru/?p=1453 (date of circulation: 07.05.2020).</mixed-citation></ref><ref id="B3"><mixed-citation>IBM. Understanding and configuring PAM. URL: https://www.ibm.com/developerworks/ru/library/l-pam (date of circulation: &amp;nbsp;08.05.2020)</mixed-citation></ref><ref id="B4"><mixed-citation>Kaspersky. How to create a strong password. URL: https://support.kaspersky.ru/common/windows/3730 (date of circulation: 08.05.2020)</mixed-citation></ref><ref id="B5"><mixed-citation>Somemoreinfo, 2017. Protecting the site from overwriting the URL password: http://somemoreinfo.ru/zashhita-sajta-ot-perebora-parolya (date of circulation: 03.05.2020).</mixed-citation></ref><ref id="B6"><mixed-citation>Studbooks, 2020. A simple diagram of the graphic. URL: https://studbooks.net/2410599/informatika/prostaya_shema_graficheskogo_parolya (date of circulation: 01.05.2020).</mixed-citation></ref><ref id="B7"><mixed-citation>Akushuev, R.T., 2020. Authentication and identification as a method of information security. E-SCIO, 1(40): 442-447. URL: https://elibrary.ru/item.asp?id=42500999&amp;amp; (date of circulation: 10.05.2020).</mixed-citation></ref><ref id="B8"><mixed-citation>Budko, E.G., 2010. Graphical authentication in Linux. URL: https://www.bibliofond.ru/view.aspx?id=607209 (date of circulation: 08.05.2020).</mixed-citation></ref><ref id="B9"><mixed-citation>ZHuk, A.P. etc. 2019. Information protection. URL: https://znanium.com/catalog/product/937469 (date of circulation: 02.05.2020).</mixed-citation></ref></ref-list></back></article>